The Charm of Secrecy: Secrecy and Society as Secrecy Studies
نویسندگان
چکیده
منابع مشابه
Secrecy logic: S -secrecy structures
Let S = 〈L, S〉 be a deductive system. An S -secrecy logic is a quadruple K = 〈FmL(V ),K,B, S〉 , where FmL(V ) is the algebra of L-formulas, K,B are S -theories, with B ⊆ K and S ⊆ K such that S ∩ B = ∅ . K corresponds to information deducible from a knowledge base, B to information deducible from the publicly accessible (or browsable) part of the knowledge base and S is a secret set, a set of s...
متن کاملSecrecy-Preserving Reasoning using Secrecy Envelopes
Inmany applications of networked information systems, the need to share information often has to be balanced against the need to protect secret information from unintended disclosure, e.g., due to copyright, privacy, security, or commercial considerations. We study the problem of secrecy-preserving reasoning, that is, answering queries using secret information, whenever it is possible to do so,...
متن کاملThe experience of secrecy.
The concept of secrecy calls to mind a dyadic interaction: one person hiding a secret from another during a conversation or social interaction. The current work, however, demonstrates that this aspect of secrecy is rather rare. Taking a broader view of secrecy as the intent to conceal information, which only sometimes necessitates concealment, yields a new psychology of secrecy. Ten studies dem...
متن کاملGeorge VOUTSADAKIS SECRECY LOGIC : PROTOALGEBRAIC S - SECRECY LOGICS
A b s t r a c t. In recent work the notion of a secrecy logicS over a given deductive system S was introduced. Secrecy logics capture the essential features of structures that are used in performing secrecy-preserving reasoning in practical applications. More precisely, they model knowledge bases that consist of information, part of which is considered known to the user and part of which is to ...
متن کاملPerfect Secrecy and Statistical
There are two key properties of the above. First, given only c, Eve should not be able to learn what m is. Second, Dec(Enc(m)) = m, so that Bob can accurately determine the message that Alice wanted to send. Creating functions Enc and Dec which satisfy this is a fundamental problem of cryptography. But given the above encryption scheme, knowing what these functions are is enough for anyone to d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Secrecy and Society
سال: 2016
ISSN: 2377-6188
DOI: 10.31979/2377-6188.2016.010101